Ofer For You (1)

Showing posts with label Cyber Security. Show all posts
Showing posts with label Cyber Security. Show all posts

Friday, 11 October 2019

What You Need To Know About Cyber Threats To Drones





  • The usage of drones has gone beyond just military purposes. Filmmaking, photography, and surveillance are among the many industries that are deploying drones for multiple purposes.
  • The increase in usage has led to cybercriminals using drones as a part of their attacks.
The drone market today
Drones are unmanned ariel vehicles that were traditionally used in the defense forces. Although they are still widely used in this field, a number of other sectors are employing drones.
  • In fact, Amazon is looking to use drones for delivery in the near future.
  • With the market steadily growing, drones are becoming accessible and affordable for a larger section of the world’s population.
Cyber threats to drones
Considering the current scenario of drones, there is a risk of attackers using them for malicious activities or hacking them to gather data without consent.
  • Hackers may employ drones as spying devices to collect data. With an advanced microphone, they can also eavesdrop on conversations. This can affect the privacy of citizens as well as collect data from confidential government locations.
  • Fake signals can be fed that tamper with the Global Positioning System (GPS) of the drones. This can cause massive impacts for military drones.
  • Small computers can be attached to drones to exploit WiFi, Bluetooth, or Radio-frequency identification vulnerabilities in restricted areas.
  • Drones are small and don’t make much noise making them hard to detect.
Detecting malicious drones

Researchers are working on ways to detect malicious drones. Some of the measures include:
  • Deploying radio-frequency scanners that look for specific transmissions from drones.
  • Acoustic sensors that match the drone sound against a signature database for a match
  • Geofencing that involves setting up a virtual border around a physical location to detect when drones enter the marked area.
These methods come with their own set of drawbacks. There are several other methods available to detect malicious drones.


Learn To Hack FB

"The Hackers Street"

Or, Subscribe to our live feed to get instant email alerts 

https://feedburner.google.com/fb/a/mailverify?uri=blogspot/MUiww 

We don't spam.


Sunday, 26 October 2014

Koler Android Ransomware Learns to Spread via SMS



Koler Android Ransomware Learns to Spreads via SMS
Users of Android operating system are warned of a new variant of Android malware Koler that spreads itself via text message and holds the victim’s infected mobile phone hostage until a ransom is paid.

Researchers observed the Koler Android ransomware Trojan, at the very first time, in May when the Trojan was distributed through certain pornographic websites under the guise of legitimate apps. It locks the victim’s mobile screen and then demands money from users with fake notifications from law enforcement agencies accusing users of viewing and storing child pornography.

ANDROID SMS WORM
Recently, researchers from mobile security firm AdaptiveMobile has discovered a new variant of the rare piece of mobile malware – named Worm.Koler – that allows the malware to spread via text message spam and attempts to trick users into opening a shortened bit.ly URL, turning Koler into an SMS worm.

Once the device is infected by the Koler variant, it will first send an SMS message to all contacts in the device's address book with a text stating, "Someone made a profile named -[the contact's name]- and he uploaded some of your photos! is that you?" followed by a Bitly link, according to the security firm.

When a victim clicks on the Bitly link, he or she is then redirected to a Dropbox page with a download link for a 'PhotoViewer' app that, if installed, will push a ransom screen to pop up incessantly on the users' screen. The ransom message reads that the device has been locked up because of having illicit content and users must pay $300 via MoneyPak to 'wave the accusations.'
"The device appears to be completely locked down with the screen on the phone blocked, so the user won't be able to close the window, or deactivate the malware through the app manager," reads the blog post. "The victim is forced to buy a voucher as instructed on the blocking page, and send the voucher code to a malware author."
INFECTION SPREADING RAPIDLY
The Worm.Koler is capable of displaying localized ransomware messages to users from at least 30 countries, including the U.S., where three quarters of the latest Koler variant infections were seen by the firm, and smaller number of infections were also being detected in parts of the Middle East.
"Due to the Worm.Koler's SMS distribution mechanism, we are seeing a rapid spread of infected devices since the 19th of October, which we believe to be the original outbreak date," the blog post states. "During this short period, we have detected several hundred phones that exhibit signs of infection, across multiple US carriers. In addition to this, other mobile operators worldwide—predominantly in the Middle East, have been affected by this malware."
HOW TO PROTECT YOURSELF
If users suspect they are infected by the malware, they should never authorize any payment as it won't guarantee the unlocking of your device, as well as it will further encourage cyber criminals to carry out such ransomware practices again and again.

Koler does not encrypt files, according to the security firm, therefore it becomes easy for users to eliminate the threat from their infected devices by following two simple steps:
  • Reboot your phone in the "Safe Mode"
  • Remove the 'PhotoViewer' app using standard Android app uninstallation tool
In order to protect yourself from such threats in future, the best practice is to have the "Unknown Sources" option turned off in your Android device' security settings menu. Turning off of this option won't let users to install applications from unknown sources, but only from the official Google Play store.

By "Kunal Vohra", Director@H2K
Still Having Problem..!!! Connect with Admin
BBM: 7F72A48D


 Kunal Vohra
Download Our Official Android App & Get Free Internet



"The Hackers Street"

For Daily Updates